Chapter 8 - Cisco PIX Firewall
This chapter introduces the Cisco PIX firewalls. This information is useful in determining which firewall is appropriate for requirements. The PIX provides a robust firewall that can protect network from attacks, and can also restrict access to legitimate users and services. The PIX goes beyond its...
Saved in:
Published in | The Best Damn Cisco Internetworking Book Period pp. 819 - 964 |
---|---|
Main Authors | , , , , , , |
Format | Book Chapter |
Language | English |
Published |
Syngress
2003
|
Online Access | Get full text |
Cover
Loading…
Summary: | This chapter introduces the Cisco PIX firewalls. This information is useful in determining which firewall is appropriate for requirements. The PIX provides a robust firewall that can protect network from attacks, and can also restrict access to legitimate users and services. The PIX goes beyond its firewall nature by providing additional services such as encryption for data transported across insecure networks and basic intrusion detection. Cisco PIX firewalls can be configured using a number of methods, including commands and web interfaces. Cisco also provides a graphical user interface for accomplishing most configurations. This chapter also provides information that one can use to build a working PIX design, from initial planning to a robust configuration. |
---|---|
ISBN: | 1931836914 9781931836913 |
DOI: | 10.1016/B978-193183691-3/50025-0 |